RDS: The current Windows Firewall profile must be configured to allow remote desktop connections
Applies To: Windows Server 2008 R2, Windows Server 2012
This topic is intended to address a specific issue identified by a Best Practices Analyzer scan. You should apply the information in this topic only to computers that have had the Remote Desktop Services Best Practices Analyzer run against them and are experiencing the issue addressed by this topic. For more information about best practices and scans, see Best Practices Analyzer.
Operating System |
Windows Server 2008 R2, Windows Server 2012 |
Product/Feature |
Remote Desktop Services |
Severity |
Error |
Category |
Configuration |
Issue
The current Windows Firewall profile is not configured to allow remote desktop connections.
Impact
Users are not able to connect to the server by using Remote Desktop Connection.
Resolution
Enable remote desktop connections by using the Windows Firewall console.
Remote Desktop must be allowed through the Windows Firewall so that Remote Desktop Connection can connect to the RD Session Host server.
Membership in the Administrators local group, or equivalent, is required to complete this procedure.
To allow Remote Desktop through the Windows Firewall
Log on to the RD Session Host server with the user account that is a member of the local Administrators group.
Click Start, and then click Control Panel.
Under the System and Security heading, click Check firewall status.
Click Allow a program or feature through Windows Firewall.
Select the Remote Desktop check box, if it is not already selected.
Click OK.
See Also
Concepts
Best Practices Analyzer for Remote Desktop Services: Configuration
Best Practices Analyzer for Remote Desktop Services